Fortigate Logging Reporting
Fortigate Logging Reporting
Fortigate Logging Reporting
in FortiOS 4.0 ™
Version 4.0 MR1
User Guide
Logging and reporting in FortiOS 4.0
Version 4.0 MR1
24 August 2009
01-410-82625-20090824
© Copyright 2009 Fortinet, Inc. All rights reserved. No part of this publication including text, examples,
diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means,
electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of
Fortinet, Inc.
Trademarks
Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient,
FortiGate®, FortiGate Unified Threat Management System, FortiGuard®, FortiGuard-Antispam,
FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager,
Fortinet®, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and
FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Contents
Contents
Introduction .............................................................................................. 7
Before you begin............................................................................................................. 7
How this guide is organized........................................................................................ 7
Document conventions .................................................................................................. 8
IP addresses............................................................................................................... 8
Cautions, Notes and Tips ........................................................................................... 8
Typographical conventions ......................................................................................... 8
CLI command syntax ................................................................................................ 10
Registering your Fortinet product............................................................................... 11
Fortinet products End User License Agreement ....................................................... 11
Customer service and technical support.................................................................... 11
Training .......................................................................................................................... 11
Fortinet documentation ............................................................................................... 12
Tools and Documentation CD................................................................................... 12
Fortinet Knowledge Base ......................................................................................... 12
Comments on Fortinet technical documentation ..................................................... 12
Index........................................................................................................ 65
Introduction
This guide provides detailed information that explains how to begin choosing a log device
for your logging requirements, the types of log files, how to configure your chosen log
device, including detailed explanations of each log type of log messages.
Logging is an integral component of the FortiGate system. Logging allows you to view the
activity and status of the traffic passing through your network, and monitor for anomalies.
This chapter includes the following topics:
• Before you begin
• Document conventions
• Registering your Fortinet product
• Fortinet products End User License Agreement
• Customer service and technical support
• Training
• Fortinet documentation
Configuring reports in FortiOS 4.0 provides information about how to configure reports if
you have logged to a FortiAnalyzer unit, FortiGate system memory, or the FortiGate unit’s
hard disk SQL database.
Document conventions
Fortinet technical documentation uses the conventions described below:
IP addresses
To avoid publication of public IP addresses that belong to Fortinet or any other
organization, the IP addresses used in Fortinet technical documentation are fictional and
follow the documentation guidelines specific to Fortinet. The addresses used are from the
private IP address ranges defined in RFC 1918: Address Allocation for Private Internets,
available at http://ietf.org/rfc/rfc1918.txt?number-1918.
Caution: Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.
Note: Presents useful information, usually focused on an alternative, optional method, such
as a shortcut, to perform a step.
Tip: Highlights useful additional information, often tailored to your workplace activity.
Typographical conventions
Fortinet documentation uses the following typographical conventions:
Table 1: Typographical conventions in Fortinet technical documentation
Convention Example
Button, menu, text box, From Minimum log level, select Notification.
field, or check box label
CLI input config system dns
set primary <address_ipv4>
end
CLI output FGT-602803030703 # get system settings
comments : (null)
opmode : nat
Emphasis HTTP connections are not secure and can be intercepted by
a third party.
File content <HTML><HEAD><TITLE>Firewall
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
* For conventions used to represent command syntax, see “CLI command syntax” on page 10
Convention Description
Square brackets [ ] A non-required word or series of words. For example:
[verbose {1 | 2 | 3}]
indicates that you may either omit or type both the verbose word and
its accompanying option, such as:
verbose 3
Angle brackets < > A word constrained by data type.
To define acceptable input, the angled brackets contain a descriptive
name followed by an underscore ( _ ) and suffix that indicates the
valid data type. For example:
<retries_int>
indicates that you should enter a number of retries, such as 5.
Data types include:
• <xxx_name>: A name referring to another part of the
configuration, such as policy_A.
• <xxx_index>: An index number referring to another part of the
configuration, such as 0 for the first static route.
• <xxx_pattern>: A regular expression or word with wild cards
that matches possible variations, such as *@example.com to
match all email addresses ending in @example.com.
• <xxx_fqdn>: A fully qualified domain name (FQDN), such as
mail.example.com.
• <xxx_email>: An email address, such as
admin@mail.example.com.
• <xxx_url>: A uniform resource locator (URL) and its associated
protocol and host name prefix, which together form a uniform
resource identifier (URI), such as
http://www.fortinet./com/.
• <xxx_ipv4>: An IPv4 address, such as 192.168.1.99.
• <xxx_v4mask>: A dotted decimal IPv4 netmask, such as
255.255.255.0.
• <xxx_ipv4mask>: A dotted decimal IPv4 address and netmask
separated by a space, such as
192.168.1.99 255.255.255.0.
• <xxx_ipv4/mask>: A dotted decimal IPv4 address and CIDR-
notation netmask separated by a slash, such as such as
192.168.1.99/24.
• <xxx_ipv6>: An IPv6 address.
• <xxx_v6mask>: A dotted decimal IPv6 netmask.
• <xxx_ipv6mask>: A dotted decimal IPv6 address and netmask
separated by a space.
• <xxx_str>: A string of characters that is not another data type,
such as P@ssw0rd. Strings containing spaces or special
characters must be surrounded in quotes or use escape
sequences
• <xxx_int>: An integer number that is not another data type,
such as 15 for the number of minutes.
Training
Fortinet Training Services provides a variety of training programs to serve the needs of our
customers and partners world-wide. Visit the Fortinet Training Services web site at
http://campus.training.fortinet.com, or email training@fortinet.com.
Fortinet documentation
The Fortinet Technical Documentation web site, http://docs.fortinet.com, provides the
most up-to-date versions of Fortinet publications, as well as additional technical
documentation such as technical notes.
In addition to the Fortinet Technical Documentation web site, you can find Fortinet
technical documentation on the Fortinet Tools and Documentation CD, and on the Fortinet
Knowledge Base.
About logging
Logging is a valuable tool, providing insight into how to better protect the network traffic
against attacks, including misuse and abuse. This valuable tool requires a plan so that you
can properly configure logging for your particular network’s needs.
This plan should provide you with an outline of what log requirements your network needs.
You plan should cover:
• what FortiGate features you want logged
• the logging device best suited for your network
• if you want or are required to archive log files
• ensuring log files are not lost in the event a failure occurs (backup solution).
Your plan should also include the following:
• The FortiGate features you want to log. For more information, see “Logging FortiGate
features” on page 14.
• The amount of storage space required to log the chosen FortiGate features. For
example, traffic logs cannot be stored in the FortiGate system memory because they
are large files. For more information, see “Logging FortiGate features” on page 14.
• The type of device appropriate for logging the chosen FortiGate features. If your
organization/company requires reports compiled from log data, a FortiAnalyzer unit
may be a better solution since it can create reports at scheduled times. For more
information, see “Log devices” on page 14.
• A backup solution in the event your logging device becomes unavailable. For more
information, see “Backup solutions for logging” on page 16.
Log devices
Log devices provide a secure place to store and view generated log files; however, some
these devices can also provide much more. For example, a FortiAnalyzer unit provides
both archiving and reporting features.
The following explains each of the supported log devices, including why that logging
device may be a good idea for your network.
System memory
The system memory on the FortiGate unit logs the following features:
• Event log
• Attack log
• Antivirus log
• Webfilter log
• Spam log
• Data Leak Prevention log
• Application Control log
• IM/P2P log
• VoIP log
System memory is limited; the system memory cannot log traffic or DLP archive logs
because of their file size and occurrence; however, if you have a local disk, it can log traffic
or DLP archive logs.
If you configured system memory logging, these logs display in Log&Report > Log Access
> Memory. System memory is a good log device when you only require logging a few
FortiGate features or for small networks, such as a home business.
FortiAnalyzer unit
The FortiAnalyzer unit logs all FortiGate features and can also archive logs. If you also
require creating reports from log data, the FortiAnalyzer unit provides a wide variety of
reports. Reports contain log information that is presented in both graphical and tabular
formats. Reports are a useful tool for reviewing what has occurred on your network in a
daily, weekly, or monthly time period.
Logs are accessed from either the web-based manager of the FortiAnalyzer unit or the
web-based manager of the FortiGate unit (Log&Report > Log Access > Remote).
You can configure up to three FortiAnalyzer units for logging FortiGate features; however,
this is more of a redundant option than a back up solution.
The FortiAnalyzer unit is perfect for large networks that require DLParchiving and reports.
The FortiGuard Analysis server can log all FortiGate features including traffic logs, as well
as full DLP archiving of all archival FortiGate features, such as email messages and FTP.
You can also generate reports from the log data stored on the FortiGuard Analysis server.
FortiGuard Analysis servers provide all the features of a FortiAnalyzer unit, but without
having an actual, physical FortiAnalyzer unit. This service provides an easy,
maintenance-free environment for logging and is best for those networks that are growing
or administrators who may not have a lot of experience with logging with a FortiGate unit.
The FortiGuard Analysis server can be used in all types of networks, large or small.
Note: If you have not already upgraded to FortiOS 4.0, you can still subscribe to the
FortiGuard Analysis and Management Service so that you can configure your FortiGate unit
to log to a FortiGuard Analysis server; however, certain FortiOS 3.0 maintenance releases
do not contain all the available features that the current FortiGuard Analysis and
Management Service version supports.
Syslog server
The Syslog server can log all FortiGate features, including content logs and VoIP logs.
You can also configure up to three Syslog servers to log all FortiGate features. Configuring
three Syslog servers is more of a redundant solution, than a back up solution.
Syslog servers are useful in any network setup, large or small.
If you require reports (which are generated from log data), you need to log to a
FortiAnalyzer unit or FortiGuard Analysis server.
FortiAnalyzer unit
A backup solution to a FortiAnalyzer unit may be a Syslog server or NetIQ WebTrends
server. You could use a FortiGuard Analysis server as a backup solution to a FortiAnalyzer
unit as well.
Syslog server
You can configure up to three Syslog servers for ensuring logs are not lost when a failure
occurs. When the FortiGate unit logs to all three Syslog servers, all three Syslog servers
receive the same logs. This ensures logs are available at all times.
Note: All log entries are cleared from the FortiGate unit system memory when the FortiGate
unit restarts.
In FortiOS 4.0 MR1, the size of a log file is reduced. This provides more room for storing
large amounts of log files on log devices as well as on the FortiGate unit. If you currently
have a scheduled uploading or rolling of log files, you may need to re-schedule because of
the reduced size. For example, logs rolled every two months, now need to be rolled every
four months.
Overwrite old logs Deletes the oldest log entry and continues logging when the
maximum log disk space is reached.
Do not log Stops log messages going to the FortiGuard Analysis server when
the maximum log disk space is reached.
5 Enter a maximum number (in MB) that the log file should not exceed in the Log file
should not exceed field.
6 To roll log files on a daily basis, select Daily in the Log files should be rolled list, and
then specify a time.
7 To roll log files on a weekly basis, select Weekly in the Log files should be rolled list,
select a week day, and then enter the time when the log file will roll.
8 Select SQL as the log format you want for each of the available logs under Log Storage
Format.
9 Select Apply.
Note: The FortiGate unit searches within the same subnet for a response from any
available FortiAnalyzer units.
4 Select Apply.
Example
This example shows how to enable logging to and set an IP address for a remote NetIQ
WebTrends server.
config log webtrends settings
set status enable
set server 172.25.82.145
end
FortiGate logs also include log subtypes, which are types of log messages that are within
the main log type. For example, in the event log type there are the subtype admin log
messages. FortiGate log types and subtypes are numbered, and these numbers appear
within the log identification field of the log message. For more information, see “FortiGate
log messages” on page 37.
Table 3: Log types and subtypes
Levels Description
0 - Emergency The system has become unstable.
1 - Alert Immediate action is required.
2 - Critical Functionality is affected.
3 - Error An error condition exists and functionality could be
affected.
4 - Warning Functionality could be affected.
5 - Notification Information about normal events.
6 - Information General information about system operations.
The Debug severity level, not shown in Table 4, is rarely used. It is the lowest log severity
level and usually contains some firmware status information that is useful when the
FortiGate unit is not functioning properly. Debug log messages are only generated if the
log severity level is set to Debug. Debug log messages are generated by all types of
FortiGate features.
Note: You need to set the logging severity level to Notification when configuring a logging
location to record traffic log messages.
Event logging
The event log records management and activity events, such as when a configuration has
changed, admin login, or high availability (HA) events occur.
When you are logged in to VDOMs, certain options may not be available, such as VIP ssl
event or CPU and memory usage events. You can enable event logs only when you are
logged in to a VDOM; you cannot enable event logs in the root VDOM.
SSL VPN All administration events related to SSL VPN, such as SSL
administration event configuration and CA certificate loading and removal.
SSL VPN session All session activity such as application launches and blocks,
event timeouts, verifications and so on.
VIP ssl event All server-load balancing events that are happening during SSL
session, especially details about handshaking.
VIP server health All related VIP server health monitor events that occur when the
monitor event VIP health monitor is configured, such as an interface failure.
CPU & memory usage Real-time CPU and memory events only, at 5-minute intervals.
(every 5 min)
4 Select Apply.
Antivirus logging
The Antivirus logs record virus incidents in Web, FTP and email traffic. For example, when
the FortiGate unit detects an infected file, blocks a file type, or blocks an oversized file or
email. You can also apply filters to customize what the FortiGate unit logs, which are:
• Viruses – The FortiGate unit logs all virus infections
• Blocked Files – The FortiGate unit logs all instances of blocked files.
• Oversized Files/Emails – The FortiGate unit logs all instances of files and email
messages exceeding defined thresholds.
• AV Monitor – The FortiGate unit logs all instances of viruses, blocked files, and
oversized files and email. This applies to HTTP, FTP, IMAP, POP3, SMTP, and IM
traffic.
Attack logging
The Attack log records attacks detected and prevented by the FortiGate unit. The
FortiGate unit will log attack signatures and attack anomalies.
DLP archiving
You can archive FTP, Email, IM, and Web (including HTTPS and all other secure
protocols), using DLP rules and sensors. This is referred to as DLP archiving. For more
information about enabling and configuring DLP archiving, see the UTM User Guide.
You can use the default DLP sensors for archiving, which are Content_Archive and
Content_Summary, available in UTM > Data Leak Prevention > Sensor. These two default
DLP sensors are dedicated to content archiving. Content_Archive provides full content
archiving, while Content_Summary provides summary DLP archiving. For more
information, see the UTM User Guide.
Figure 2 helps to explain what can be seen when full DLP archiving is enabled, such as
from the Email tab. When full DLP archiving is enabled, you can view the email message
and any attachments, including HTML or XML pages.
Figure 2: An example of an archived email message as displayed in DLP Archive > Email
Note: When viewing web archives, the URL is usually saved as a PDF, except for XML
pages which are saved as XML.
Email to Enter up to three email address recipients for the alert email message.
Authentication Select the authentication Enable check box to enable SMTP
authentication.
SMTP user Enter the user name for logging on to the SMTP server to send alert
email messages. You need to do this only if you have enabled the
SMTP authentication.
Password Enter the password for logging on to the SMTP server to send alert
email. You need to do this only if you selected SMTP authentication.
Send alert email for the Select to have the alert email sent for one or multiple events that
following occur, such as an administrator logging in and out.
Interval Time Enter the minimum time interval between consecutive alert emails.
(1-9999 minutes) Use this to rate-limit the volume of alert emails.
Intrusion detected Select if you require an alert email message based on attempted
intrusion detection.
Virus detected Select if you require an alert email message based on virus detection.
Web access blocked Select if you require an alert email message based on blocked web
sites that were accessed.
HA status changes Select if you require an alert email message based on HA status
changes.
Violation traffic Select if you require an alert email message based on violated traffic
detected that is detected by the Fortinet unit.
Firewall authentication Select if you require an alert email message based on firewall
failure authentication failures.
SSL VPN login failure Select if you require an alert email message based on any SSL VPN
logins that failed.
Administrator Select if you require an alert email message based on whether
login/logout administrators log in or out.
IPSec tunnel errors Select if you require an alert email message based on whether there is
an error in the IPSec tunnel configuration.
L2TP/PPTP/PPPoE Select if you require an alert email message based on errors that
errors occurred in L2TP, PPTP, or PPPoE.
Configuration changes Select if you require an alert email message based on any changes
made to the FortiGate configuration.
FortiGuard license Enter the number of days before the FortiGuard license expiry time
expiry time (1-100 notification is sent.
days)
FortiGuard log quota Select if you require an alert email message based on the FortiGuard
usage Analysis server log disk quota getting full.
Send alert email for logs Select if you want to send an alert email that is based on a specified
based on severity log severity, such as warning.
Minimum log level Select a log severity from the list. For more information about log
severity levels, see “Log severity levels” on page 29.
Note: The default minimum log severity level is Alert. If the FortiGate unit collects more
than one log message before an interval is reached, the Fortinet unit combines the
messages and sends out one alert email.
For more information about quarantined files, see the UTM User Guide.
proto=(6) The protocol that applies to the session or packet. The protocol
number in the packet header that identifies the next level protocol.
Protocol number’s are assigned by the Internet Assigned Number
Authority (IANA).
service=(80/tcp) The IP network service that applies to the session or packet. The
services displayed correspond to the services configured in the
firewall policy.
app_type=(N/A) The application or program used. If there was no program used to
create the traffic, then it is empty and displays N/A. The following
are application types:
• BitTorrent
• eDonkey
• Gnutella
• KaZaa
• Skype
• WinNY
• AIM
• ICQ
• MSN
• Yahoo!
status=(accept) The status can be either deny or accept depending on the
applicable firewall policy.
src=(172.16.135.25) The source IP address.
srcname= The source name or the IP address.
(172.16.135.25)
dst=(172.16.25.125) The destination IP address.
dstname= The destination name or IP address.
(172.16.25.125)
src_ int= (internal) The interface where the through traffic comes in. For outgoing
traffic originating from the firewall, it is “unknown”.
dst_ int=(wan1) The interface where the through traffic goes to the public or
Internet. For incoming traffic to the firewall, it is “unknown”.
sent=(825) The total number of bytes sent.
rcvd=(4451) The total number of bytes received.
sent_ pckt=(8) The total number of packets sent during the session.
rcvd_pckt=(6) The total number of packets received during the session.
src_ port=(2504) The source port of the TCP or UDP traffic. The source protocol is
zero for other types of traffic.
dst_ port=(80) The destination port number of the TCP or UDP traffic. The
destination port is zero for other types of traffic.
vpn=(N/A) The name of the VPN tunnel used by the traffic.
tran_ip=(0.0.0.0) The translated IP in NAT mode. For transparent mode, it is
“0.0.0.0”.
tran_port=(0) The translated port number in NAT mode. For transparent mode, it
is zero (0).
dir_disp=(org) The direction of the sessions. Org displays if a session is not a
child session or the child session originated in the same direction
as the master session. Reply displays if a different direction is
taken from the master session.
tran_disp=(noop) The packet is source NAT translated or destination NAT translated.
HTTP status: (clean) Indicates the status of the HTTP content. This can be any one of
the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
number of bytes from client: The number of bytes that were received from the client.
(401)
number of bytes from The number of bytes that were received from the server.
server: (4203)
HTTP command: (GET) The type of HTTP command used. In this example, it was the GET
command.
url= The URL address of the web site that was accessed.
(172.25.124.133/favicon.ico)
service=(“http”) The service of where the activity or event occurred, whether it was
on a web page using HTTP or HTTPs. The service field can have
the protocols HTTP, FTP or SMTP.
agent=(“n/a”) This field is for FortiGate units running FortiOS Carrier. If you do
not have FortiOS Carrier running on your FortiGate unit, this field
always displays N/A.
status=(“passthrough”) The action the FortiGate unit took when the event occurred.
url= The URL address of where the file was acquired.
(“http://172.16.25.127/financ
e/finance_headquarters/
headquarters_pic1.png”)
ref=(“n/a”) The URL reference that gives more information about the virus. If
you enter the URL in your web browser’s address bar, the URL
directs you to the specific page that contains information about the
virus.
msg= Explains the activity or event that the FortiGate unit recorded. In
(“File exceeds size limit.”) this example, the file that was downloaded from the web site
exceeded the specified size limit.
url=(“example.com”) The URL address of the web site that was visited.
from= The sender’s email address.
(“user22@example.com”)
to= The receiver’s email address.
(“user55@example.com”)
msg=[“(data leak detected (Data Explains the activity or event that the FortiGate unit recorded.
Leak Prevention Rule In this example, the data leak that was detected match the
matched”)] rule, All-HTTP, in the DLP sensor.
kind=(N/A) The type of operation which triggered the action. This can
be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
profile=(“N/A”) The protection profile associated with the firewall policy that
traffic used when the log message was recorded.
dir=(N/A) The direction of the traffic that triggered the action, which
can be incoming, outgoing, N/A, or unknown.
src=(172.16.23.99) The source IP address.
sport=(443) The source port.
src_int=(“wan1”) The name of the source interface.
dst=(10.10.20.1) The destination IP address.
dport=(2524) The destination port.
dst_int=(“internal”) The name of the destination interface.
src_name=(“172.16.23.99”) The name of the source.
dst_name=(“10.10.20.1”) The name of the destination.
proto=(6) The protocol that applies to the session or packet. The
protocol number in the packet header that identifies the
next level protocol. Protocol number’s are assigned by the
Internet Assigned Number Authority (IANA).
service=(“2524/tcp”) The service of where the event or activity occurred.
policyid=(1) The firewall policy identification number.
serial=(613935) The session number of the application control log
message. same as dlp
app_list=(“App_1”) The name of the application control list that triggered the
action.
app_type=(“N/A”) The type of application that triggered the action within the
control list.
app=(“Unknown Application”) The name of the application that triggered the action within
the control list.
action=(pass) The action that was taken by the application control engine.
This can be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
• unknown
count=(1) The number of times the same event was detected within a
short period of time.
msg=(:Unknown Application”) Explains the activity or event that the FortiGate unit
recorded. In this example, the application control list App_1
detected an unknown application.
Note: You can configure reports from logs stored on a FortiAnalyzer unit, FortiGate system
memory, or an SQL database. Configuring reports from other log devices, such as a Syslog
server, are not supported.
Configuring reports
A report is a collection of log information, which is then displayed in the report in the form
of text, graphs and tables. This provides a clear, concise overview of the activities on your
network without manually going through large amounts of log messages.
If you have configured logging to a FortiAnalyzer unit, you will only be able to configure a
report schedule on the FortiGate side. You need to verify with the FortiAnalyzer
administrator that a report layout is available for you to use with the report schedule; a
report schedule requires a report layout.
If you have configured logging to an SQL database, you can configure report widgets
which are very similar to the Top Viruses or Traffic History widgets that display on System
> Dashboard. You cannot customize the type of graph or table that appears in the report
widget.
Figure 4: A basic traffic report displaying only Browsing, DNS and Email log information over
the last three days
When you go to the Memory page, there are two reports that appear on the page,
Bandwidth Protocols and Top Protocols Ordered by Total Volume. The first report,
Bandwidth Protocols, is the report that you can configure. The second report, Top
Protocols Ordered by Total Volume, displays traffic volume and does not update when you
configure Bandwidth Protocols report. When you go to another page in the web-based
manager, the settings on the Memory page go back to default; the basic traffic report that
you configured is not saved on the FortiGate unit’s system memory.
To configure a basic traffic report, go to Log&Report > Report Access > Memory, and
select a time period from the Time Period list. Select the check boxes beside the options
(such as Email) that you do not want included in the graph, and then select Apply.
Time Period Select a time range to view for the graphical analysis. You can
choose from one day, three days, one week, or one month. The
default day is 1 day. When you refresh your browser or go to
different menu, the settings revert back to default.
Services By default all services are selected. When you refresh your
browser or go to a different menu, all services revert to default
settings. Clear the check boxes beside the services you do not
want to include in the graphical analysis:
• Browsing
• DNS
• Email
• FTP
• Gaming
• Instant Messaging
• Newsgroups
• P2P
• Streaming
• TFTP
• VoIP
• Generic TCP
• Generic UDP
• Generic ICMP
• Generic IP
Bandwidth Per This bar graph is based on what services you select, and is
Service updated when you select Apply. The graph is based on date and
time, which is the current date and time.
Top Protocols This bar graph displays the traffic volume for various protocols, in
Ordered by Total decreasing order of volume. The bar graph does not update when
Volume you select different Services and then select Apply.
Note: The date used to present the information for the basic traffic report is erased when
the FortiGate unit is reset or rebooted.
Delete
Edit
Clone
Log Data Filtering You can specify the variables that were selected in the charts when the
report layout (that you are using for this report schedule) was configured.
Virtual Domain Select to create a report based on virtual domains. Enter a specific virtual
domain to include in the report. If you want to include multiple virtual
domains, use a comma between each.
User Select to create a report based on a network user. Enter the user or users,
separated by a comma, in the field.
Group Select to create a report based on a group of network users, that are defined
locally. Enter the name of the group or groups, separated by a comma, in the
field.
Time Period The time period of what
• Relative to report run-time – select to specify the time period of the log
files that will be used for the report.
• Specify – specify the start and end dates (year, date, month and time
period) of the log files that will be used for the report.
Output Select the check box beside the type of file format that you want the report to
be in when it is generated. You can choose from PDF, MS Word, Text (TXT),
and MHT.
+ Add Widget Select to add a report widget to the Execute Summary page. You can
only add one report widget at a time.
Widgets The list of available reports widgets.
Schedule The type of time period used.
• If you select Daily, you need to configure the hour that the report
widget will gather the information and generate the output on.
• If you select Weekly, you need to configure the day of the week
and the hour that the report widget will gather the information and
generate the output on.
Daily Select to configure the hour of when the report widget will generate
the output. Hours are in the 24-hour format.
Weekly Select to configure the day of the week and the hour of the day that
will generate output on. Hours are in the 24-hour format.
Display Column Select one of the following to customize which column contains the
information:
First Column The widget will display in the first column, which is located on the left
side of the page beside the menus. By default, the first column is
selected.
Second Column Select to have the widget display in the second column, on the right
side of the page.
Index
A documentation
commenting on, 12
adding configuring defining, 22 Fortinet, 12
alert email message, 34 dotted decimal, 10
antivirus logging, 32
application control, 31
attack logging, 32
F
basic traffic reports (system memory), 57 FortiAnalyzer unit, 15
CLI command syntax, 10 FortiGate documentation
connecting using automatic discovery, FortiAnalyzer, 22 commenting on, 12
data leak prevention logging, 31 FortiGate features, logging, 14
data types in angled brackets, 10 FortiGuard
dlp archiving, 33 Antivirus, 11
event logging, 30 services, 11
explanation of log messages, 37
FortiGuard Analysis server, 15, 22
firewall policy traffic logging, 30
FortiAnalyzer reports, 60 Fortinet
FortiAnalyzer unit, 21 Technical Support, 11
hard disk, 20 Fortinet documentation, 12
log messages, 37 Fortinet Knowledge Center, 12
log severity levels, 29 fully qualified domain name (FQDN), 10
log types and subtypes, 27
logging, 13 I
logging practices, 13
multiple FortiAnalyzer units, 24 introduction
multiple syslog servers, 25 Fortinet documentation, 12
spam filter logging, 33 IP address
sql database, 21 private network, 8
sql database reports, 62
syslog server, 23 L
system memory, 20
testing FortiAnalyzer configuration, 22 local disk, amc disks, 15
web filter logging, 32 log backup solutions
webtrends server, 23 FortiAnalyzer unit, 17
hard disks and amc disks, 16
netiq webtrends server, 17
C syslog server, 17
CIDR, 10 log devices
comments, documentation, 12 FortiAnalyzer unit, 15
configuring FortiGuard Analysis server, 15
alert email message, 34 local disk, amc disks, 15
basic traffic reports (system memory), 57 netiq webtrends server, 16
FortiAnalyzer reports, 60 sql database, 15
multiple FortiAnalyzer units, 24 syslog server, 16
multiple syslog servers, 25 system memory, 14
sql database reports, 62 log messages
connecting using automatic discovery, FortiAnalyzer, 22 antispam, 49
customer service, 11 antivirus, 43
application control, 53
attack, 47
D dlp, 51
devices dlp archive, 41
FortiAnalyzer unit, 15 event, 40
FortiGuard Analysis server, 15 traffic, 38
local disk, amc disks, 15 webfilter, 45
netiq webtrends, 16 log types and subtypes, 27
sql database, 15 logging features, 14
syslog server, 16
system memory, 14 N
netiq webtrends server, 16
Logging and reporting in FortiOS 4.0 Version 4.0 MR1 User Guide
01-410-82625-20090824 65
http://docs.fortinet.com/ • Feedback
Index
P sql databse, 15
string, 10
product registration, 11 syslog server, 16
system memory, 14
Q
quarantine files, 35 T
technical
R support, 11
regular expression, 10 testing FortiAnalyzer configuration, 22
reports (FortiAnalyzer), 60
reports (sql database), 62 V
RFC value parse error, 10
1918, 8 viewing quarantine files, 35
S W
severity levels (logs), 29 wild cards, 10
Logging and reporting in FortiOS 4.0 Version 4.0 MR1 User Guide
01-410-82625-20090824 66
http://docs.fortinet.com/ • Feedback
www.fortinet.com
www.fortinet.com